Results 11 to 20 of about 1,364,067 (299)
This guide is intended to present a selected list of sites that cover the basic issues of computer security and which provide useful information for the non-expert (librarian, undergraduate student, office manager, etc.) who wants to learn more about ...
Jane F. Kinkus
doaj +1 more source
The protection of information against electromagnetic penetration is one of the most important aspects related to the protection of information against its non-invasive acquisition. Compared to the activities of cybercriminals, the use of electromagnetic
Ireneusz Kubiak, Artur Przybysz
doaj +1 more source
Temporal Segment Connection Network for Action Recognition
Two-stream Convolutional Neural Networks have shown excellent performance in video action recognition. Most existing works train each sampling group independently, or just fuse at the last level, which obviously ignore the continuity of action in ...
Qian Li +4 more
doaj +1 more source
Towards operational measures of computer security [PDF]
Ideally, a measure of the security of a system should capture quantitatively the intuitive notion of ‘the ability of the system to resist attack’. That is, it should be operational, reflecting the degree to which the system can be expected to remain free
Brocklehurst, S. +8 more
core +2 more sources
Metis: An Integrated Morphing Engine CPU to Protect Against Side Channel Attacks
Power consumption and electromagnetic emissions analyses are well established attack avenues for secret values extraction in a large range of embedded devices.
Francesco Antognazza +2 more
doaj +1 more source
SECURITY OF TEACHING ACTIVITIES ONLINE [PDF]
The current pandemic context has led to the rapid transition of all online teaching activities, and the security of all activities has become vulnerable, largely due to limited awareness by students and teachers, creating a security breach through the ...
CARINA-ELENA STEGĂROIU +2 more
doaj
Constructing a Macro Virus to Upgrading Antivirus Programs [PDF]
A virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents. a macro virus is a virus that is written in a macro language, a language built into a software application such as a Word processor,
Wesam S. Bhaya, Alaa Abd Alhesain
doaj +1 more source
Delta system transfer function model for IEMI time domain test [PDF]
Intentional electromagnetic interference (IEMI) is a serious threat to the stable operation of computer and other intelligent terminal equipment. For testing research on IEMI, it is very important to build a stable and reliable test system model for ...
Ma Rupo +3 more
doaj +1 more source
An Immune Inspired Approach to Anomaly Detection [PDF]
The immune system provides a rich metaphor for computer security: anomaly detection that works in nature should work for machines. However, early artificial immune system approaches for computer security had only limited success.
Aickelin, Uwe, Twycross, Jamie
core +4 more sources
Human Factors in Security – Cybersecurity Education and Awareness of Business Students
Theoretical background: The rapid development of Internet interactions and a growing number of information technology users caused by digital society development and accelerated by the COVID-19 pandemic yield the significant growth of cyber-attacks and ...
Łukasz Wiechetek, Marek Mędrek
doaj +1 more source

